Author of the publication

Cryptanalysis of a Secure and Privacy Preserving Mobile Wallet Scheme with Outsourced Verification in Cloud Computing.

, , and . CICBA (2), volume 1031 of Communications in Computer and Information Science, page 411-424. Springer, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cryptanalysis of an elliptic curve cryptography based lightweight authentication scheme for smart grid communication., and . RAIT, page 1-6. IEEE, (2018)A Secure Anonymous Mobile Handover Authentication Protocol for Content Centric Network., and . CICBA (2), volume 1031 of Communications in Computer and Information Science, page 360-373. Springer, (2018)An ECC based public key infrastructure usable for mobile applications., and . CCSEIT, page 562-568. ACM, (2012)Post-quantum lightweight identity-based two-party authenticated key exchange protocol for Internet of Vehicles with probable security., , , and . Comput. Commun., (2022)Enhanced pairing-free identity-based broadcast authentication protocol in WSN using ElGamal ECC., , , , and . Secur. Priv., (May 2023)Usage of Internet of Things in Home Automation Systems: A Review., , , and . CoMSO, volume 206 of Smart Innovation, Systems and Technologies, page 57-72. Springer, (2020)Cryptanalysis of a Secure and Privacy Preserving Mobile Wallet Scheme with Outsourced Verification in Cloud Computing., , and . CICBA (2), volume 1031 of Communications in Computer and Information Science, page 411-424. Springer, (2018)Design of Mobile Public Key Infrastructure (M-PKI) Using Elliptic Curve Cryptography. International Journal on Cryptography and Information Security (IJCIS), 3 (1): 25-37 (March 2013)A Certificate Authority (CA)-based cryptographic solution for HIPAA privacy/security regulations., and . J. King Saud Univ. Comput. Inf. Sci., 26 (2): 170-180 (2014)SAK-SAE: A Secure Authentication and Key-Exchange Scheme for Smart Agricultural Environment using Fuzzy Extractor., , and . OCIT, page 867-873. IEEE, (2023)